-
Top Story
NHS asks suppliers to sign up to cyber covenant
As the Cyber Security and Resilience Bill continues its progress through the Wetsminster system, NHS digital leaders have called…
Read More » -
Top Story
How close is quantum computing to commercial reality?
Quantum computing may still be regarded by many IT leaders as a very niche technology, but broader business use…
Read More » -
Top Story
Post Office scandal inquiry to publish first findings this summer
The Post Office scandal public inquiry will publish the first part of its final report this summer, with its…
Read More » -
Top Story
Is IPSIE the game changer that SaaS security demands?
Over the past few years, Okta has stated its commitment to ending the threat of identity-enabled cyber crime and…
Read More » -
Top Story
Smart ball analytics proves value in rugby
How is the discipline of sports analytics evolving to deliver marginal gains to the performance of players and teams?…
Read More » -
Top Story
Can ‘god-like technologies’ be prevented from harming a generation of children?
As the UK’s Online Safety Act (OSA) continues to make its way through the implementation process – with a…
Read More » -
Top Story
Scattered Spider retail attacks spreading to US, says Google
Retailers in the United States are now coming under attack from Scattered Spider, the English-speaking hacking collective that is suspected…
Read More » -
Top Story
Why we must reform the Computer Misuse Act: A cyber pro speaks out
Eight years ago, Simon Whittaker, head of cyber security at Belfast-based consultancy Instil, narrowly avoided having his front door…
Read More » -
Top Story
It’s time to get to grips with DORA
It’s no surprise to me that financial services organisations missed the 17 January2025 deadline to be in compliance with the…
Read More » -
Top Story
Enisa launches European vulnerability database
The European Union Agency for Cybersecurity (Enisa) has debuted a European Union Vulnerability Database (EUVD) to provide “aggregated, reliable…
Read More »